Please enable JavaScript to use CodeHS

Tennessee Coding I Glossary

Flashcards

Course:

Module:

Search:

Define a Function JavaScript

Defining a function means to teach the computer a new command and explain what it should do when receiving that command.

Define a Function

Call a Function JavaScript

Calling a function actually gives the command, so the computer will run the code for that function.

Call a Function

Timer JavaScript

Timers are used to used perform repeated action in a program

Timer

Callback Function JavaScript

A function passed as a parameter to another function in order to be called later.

Event JavaScript

An event is an action (such as clicking the mouse or pressing a key on the keyboard) that a program detects and uses as input.

Event

Mouse Event General

A mouse event is when the user does something with the mouse, like clicking or moving.

Key Event JavaScript

A key event is when the user does presses any of the keyboard keys.

Privacy Policy General

Legal document outlining how a company can collect and use your data

personally identifiable information General

any data that can be used to identify an individual, such as their name, address, or social security number

Information Literacy General

Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Artificial Intelligence General

A computer system able to perform tasks that ordinarily require human intelligence

Deepfake General

a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.

Internet of Things General

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

Confidentiality General

The protection of information from people who are not authorized to view it.

Integrity General

Aims at ensuring that information is protected from unauthorized or unintentional alteration.

Availability General

The assurance that systems and data are accessible by authorized users when and where needed.

Non-Repudiation General

Ensures that one cannot deny having sent or received a message.

Vulnerability General

A flaw or weakness in a system or device.

Risk General

The potential for loss when an attack happens.

Threat JavaScript

A potential for a cybercriminal to exploit a vulnerability.

Authentication General

The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.

Authorization JavaScript

The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.

Accounting General

The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.

Malware General

Any type of software that is designed to intentionally harm or damage a computer or network.

Virus General

A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.

Ransomware General

A software that prevents users from accessing their files or network until a ransom is paid.

Spyware General

Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.

Phishing General

A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.

Firewall General

A network security device that monitors and filters incoming and outgoing network traffic.

Passphrase JavaScript

A type of authentication that is similar to a password but longer and is usually a sentence or a series of words

Two-Factor Authentication JavaScript

(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)

Multifactor Authentication JavaScript

(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).

Biometric Authentication General

A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity

Password Manager General

Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.

Digital Footprint General

The information about a particular person that exists on the Internet as a result of their online activity

Cyberbullying General

the use of electronic communication to bully a person

Copyright General

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale

Ethics General

The moral principle that governs a person's behavior.

Law General

refers to an external mechanism of control

Hacktivist General

A specific group of hackers who are motivated by their ideological views.

Cyberterrorists General

Have political motivations with the intent to harm, typically resulting in violence.

Nation State Hackers General

Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.

platform General

An operating system such as Windows, Mac OS, Android or iOS.

single-platform software General

Software that only works on one platform, such as only on Android phones, or only on Mac computers.

cross-platform software General

Software that works on multiple platforms.

user account General

Used to log in to a computer, comprised of a username, password, personalized settings and set permissions.

admin account General

Has full access and full control to manage other users, set permissions and change computer settings and programs.

user permissions General

Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.

host account General

The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.

security baseline General

An agreed upon set of rules and permissions.

authorization General

Specifying access rights and permissions for each user.

authentication General

Proving the identity of the user.

patches General

Updates that address and fix security vulnerabilities within a program or product.

computer virus General

A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).

backup General

A copy or snapshot of the state of your computer.

full backup General

Backs up everything on your computer.

incremental backup General

Backs up only what has changed since the last backup.

browser General

Used to navigate the world wide web and view HTML files.

cache General

A collection of data and files used to increase the speed of the browser.

client-side scripting General

Program code, usually written in JavaScript, that is executed on the client's browser.

proxy server General

An intermediary between the user and the Internet that takes requests from the user and returns a response.

certificate General

Confirms the identity and authenticity of a website.

software license General

Legally binding guidelines for use and distribution of software.

open source software General

Software that is available for anyone to access and modify.

proprietary software General

Software that is owned by an individual or company.

application architecture model General

Refers to the design of the essential parts of an application and how they are connected to each other.

locally installed software General

Software installation that is performed on your local computer.

local network hosted General

Software installation that is performed on a local area network (LAN).

cloud hosted General

Software that is installed, hosted and accessed entirely from a remote server or location.

Form Factor General

The size, shape, and physical specifications of any physical aspect of a computer system.

command line interface (CLI) General

Processes commands to a computer program in the form of lines of text.

View Page Source General

Displays the HTML, CSS, and JavaScript code of a website.

Developer Tools General

Browser tools that help programmers diagnose problems, build and maintain secure websites.

Elements Panel General

Used for inspecting and making live-edits of the HTML and CSS.

Console Panel General

Used for entering live JavaScript for testing and debugging.

Application Panel General

Used for inspecting all resources that are loaded like databases, storage, cookies, images, etc.

Session Storage General

Temporary storage that is emptied when the browser is closed.

Local Storage General

Persistent storage; should be encrypted.

Cache General

Stores website data such as HTML and CSS to reduce load time.

Cookies General

Stores website preferences and personal data.

Security Panel JavaScript

Used for debugging issues and checking the website’s digital certificate.

Data General

A collection of numbers or data points.

Information General

Created when a collection of data is organized or structured.

Knowledge General

Pulls meaning from information by analyzing the organized data and generating insights.

Data In Use General

This is when data is being accessed by a person or program.

Data in Transit General

This is when data is actively moving from one location to another.

Data at Rest General

This is when data is stored in a specific place that isn’t actively moving to other devices or networks.

Database General

A collection of data that is organized in a structured way.

Table General

A category of information.

Record General

A single entry in a database table.

Field General

A specific category of data within a record.

Database Management System General

An electronic system that allows data to be easily accessed, updated, and manipulated.

Syntax General

The set of rules that define how commands and instructions are written.

Query General

A request for information from a database.

SQL injection (SQLi) General

Refers to an attack where a cybercriminal attempts to use an input field to write and run malicious SQL statements.

Cross Site Scripting (XSS) General

An attack in which malicious scripts are sent to users through a website.

Input Validation General

A programming technique used to validate the input from the user. The code will check the data that the user inputs and make sure it fits certain criteria. This ensures that only the correct type of value is used within the input field.

Buffer General

A section of memory set aside to be used for a specific reason.

Buffer Overflow General

Occurs when there is more data put into a buffer than it can handle.

Error Exceptions (or Handling) JavaScript

Used by programmers to avoid revealing valuable clues to potential attackers.

Integer Overflow General

An error that occurs when the result of an integer operation does not fit within the allocated memory space.

vulnerability General

a weakness which can be exploited by a malicious actor / attacker to perform unauthorized actions within a computer system.

network port General

A location where information is sent from one computer to another.

Cyber Threat General

A cyber threat is the potential harm that could be caused by someone taking advantage of a vulnerability.

Cyber Attack General

Cyber attacks occur when threat actors exploit, or take advantage of, vulnerabilities to execute a malicious plan to harm a network, computer system, or organization

Nmap General

Nmap (Network Mapper) is a free and open source tool that scans systems over a network and provides a wealth of information about them, such as their open ports.

Risk Management General

Risk management is the process of identifying, evaluating, and addressing an organization's cybersecurity threats.

If Statement General

An if statement lets you ask a question to the program and only run code if the answer is true.

If Statement

If Else Statement General

Control structure that lets us run either one section of code or another depending on a test.

If Else Statement

Conditional Statement General

A statement that evaluates to true or false.

If Statement General

An if statement lets you ask a question to the program and only run code if the answer is true.

While Loop General

Lets us repeat code as long as something is true.

While Loop

For Loop JavaScript

A for loop lets us repeat code a **fixed number of times**.

For Loop

Array JavaScript

Also called a list. A data structure that holds a collection of values in a particular order

List Array

Array Index Java

The position of an element in an array. The first element is at index 0, the second element is at index 1, and so on.

Push JavaScript

To add an item to a list or array

Push

Pop JavaScript

To remove the item in the last position from an array

Pop

Looping Through Arrays JavaScript

Looping through an array is the process to loop through an array and access each of the elements. Caution must be taken to avoid looping beyond the valid index values.

Array Methods General

Built-in functions that perform various operations on arrays, such as searching, iterating, modifying, and accessing elements.

Argument JavaScript

A variable passed as a value to a function

argument

Parameter JavaScript

A variable passed in from outside the function

parameter

Return JavaScript

Exit a function and return a value

Return

Return Value JavaScript

The value returned from a function when the function is called.

Default Value JavaScript

The default value given to a parameter when it is initialized if no value is passed in.

Variable General

A symbol or container that holds a value.

variable

Scope General

In what part of the program the variable exits

Scope

Global variable JavaScript

A variable that can be used throughout a program, in every scope

Global variable

Local variable General

A variable that is restricted to use in a certain scope of a program

Local variable

Constant JavaScript

A variable in a program that has a value that does not change.

Constant

Canvas JavaScript

The screen in which our graphics programs are drawn.

Canvas

Coordinate system JavaScript

A coordinate system uses numbers as coordinates to place objects in a geometric space.

coordinate system

Radius JavaScript

The length between the center and edge of a circle

Software Development Life Cycle General

A methodology that outlines a series of steps that divide the software development process into tasks you can assign, complete, and measure.

Prototype General

A model designed to demonstrate the most basic functionality or basic design of a product, sometimes used as a proof of concept

Use case General

A particular sequence of actions that a user takes to accomplish a particular task

Growth Mindset General

A can-do attitude in which a person views challenges and setbacks as ways to learn rather than terminal obstacles in their path to their goal